Mobile Phone Essays (Examples)

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… aware of the locations of Starbucks due to the GPS system. [1: Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective mobile App Marketing. Digital Turbine.]…

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Allied Health And Technology Institute Reopening Guidelines COVID 19

Pages: 11 (3201 words) Sources: 3 Document Type:Essay Document #:35262297

… these symptoms throughout the day and immediately report to the Director of Student Health Services (SHS). The institution could work towards developing a mobile app or tool that works like the PiratePort Tool at East Carolina University, which allows students and faculty to voluntarily register their mobile devices and thereafter receive alerts reminding them of their obligation to conduct self-screening and provide CDC guidance on the screening process and self-isolation. … residential facilities, suspected individuals will return home and await their results to be provided in not more than 48 hours via email or phone. The SHS will collaboratively with the Dean of Students arrange transportation back to one’s residence through institutional cars to avoid potential spread to … of a suspected test, the institution will notify DC Health of the same via call on 202-576-1117 and leave a voicemail with direct phone number to allow them to call……

References

References

CDC (2019). Operating Schools during Covid-19: CDC’s Considerations. Center for Diseases Prevention and Control (CDC). Retrieved from  https://www.cdc.gov/coronavirus/2019-ncov/community/schools-childcare/schools.html 

DC Health (2020). Health Notice for district of Columbia Healthcare Providers . DC Health. Retrieved from  https://dchealth.dc.gov/sites/default/files/dc/sites/doh/publication/attachments/COVID-19_HAN_20200305_Final_update.pdf 

WHO (2020). Key Messages and Actions for Covid-19 Prevention and Control in Schools. World Health Organization. Retrieved from  https://www.who.int/docs/default-source/coronaviruse/key-messages-and-actions-for-covid-19-prevention-and-control-in-schools-march-2020.pdf?sfvrsn=baf81d52_4 

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population … transmitter and a receiver. The message signal is conveyed to the nearby antenna spot and is transported via optic-fiber cable to a wired phone or via radio signal to a different wireless phone. Notably, the vulnerable and open nature of wireless communications networks causes wireless transmissions to be substantially more susceptible to different malicious attacks by ……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Using DoorDash To Promote A Restaurant Brand

Pages: 7 (2131 words) Sources: 4 Document Type:Research Paper Document #:85037477

… low and to expect new orders.
Customers on the go are going to want to be able to place orders using their cell phone and are likely to be more appreciative of a pub that is mobile friendly on their site. Sites that have not been updated to be mobile friendly are basically a waste of time. This is one example of an efficiency through technology. Another is to bring in iPads for ……

References

References

Gallardo-Echenique, E. E., Marqués-Molías, L., Bullen, M., & Strijbos, J. W. (2015). Let’s talk about digital learners in the digital era. International Review of Research in Open and Distributed Learning, 16(3), 156-187.

Gibson, C., & Homan, S. (2004). Urban redevelopment, live music and public space: Cultural performance and the re?making of Marrickville. International Journal of Cultural Policy, 10(1), 67-84.

Lawson, C. (2007). Victorian Young Planners: News and Views-Pot, Parma and Trivia Night. Planning News, 33(6), 12.

Queensland. (2020). Key components of a digital strategy. Retrieved from https://www.business.qld.gov.au/running-business/it/digital-strategy/key-components

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… and collaboration between team members.
IT specialist
? Ensuring data quality; information assurance constructs of confidentiality, integrity, and data availability
? Design of mobile app, database, and web portal
Data integration and analysis
? Customization of the open-source electronic health record
Health information system design, development and … the health information system
Advanced practice nurses (two)
? Designing of well-being assessments
? Personalized interventions
? Providing feedback on electronic health records, mobile app, and web portal
Specialty expertise in various areas of clinical medicine
Provides clinical information and feedback needed by the IT specialist to ……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

Recruiting And Managing Volunteers For Social Impact Organizations

Pages: 7 (2046 words) Sources: 7 Document Type:Essay Document #:50131238

… manage groups, direct operations, and engage in strategizing. Volunteers exist at all levels of an organization, from the Board to the room where phone calls are taken. The role they play all depends upon who they are, where they come from and what they bring to the … target group, and fundraising to supply the financial capital. Key resources will include communication resources, funding operations resources, human resources, infrastructural resources, and mobile resources, who would supply the human and intellectual capital. The value proposition of the organization would be that which states the value that ……

References

References

The Economist. (2011). Wikipedia’s fundraising, free but not easy. Retrieved from  http://www.economist.com/node/21536580 

Eisner, D., Grimm Jr, R. T., Maynard, S., & Washburn, S. (2009). The new volunteer workforce. Stanford Social Innovation Review, 7(1), 32-37.

Georgetown University Alumni Career Services. (2016). Effective Volunteer Recruitment & Management Strategies for Non-Profits. Retrieved from  https://www.youtube.com/watch?v=a6h4Pk47ymE#action=share 

Hager, M.A., & Brudney, J.L. (2004). Volunteer management practices and retention of volunteers. Retrieved from  http://www.urban.org/uploadedpdf/411005_volunteermanagement.pdf 

Screwvala, T. (2018). How Volunteering can help Change the World. Retrieved from  https://www.youtube.com/watch?v=uGtFvOSmZ8A#action=share 

Smith, D. H. (1994). Determinants of voluntary association participation and volunteering: A literature review. Nonprofit and voluntary sector quarterly, 23(3), 243-263.

US Department of Health and Human Services. (2005). Successful Strategies for Recruiting, Training, and Utilizing Volunteers. Retrieved from  https://www.samhsa.gov/sites/default/files/volunteer_handbook.pdf 

Studyspark

Study Document Study Document

Parent Involvement In Child Learning

Pages: 2 (643 words) Sources: 2 Document Type:Essay Document #:26311129

… involvement in their child’s education. Teachers can create automated weekly newsletters that are sent to parents via email. They can also use available mobile apps to organize the classroom and share experiences regarding learning in the classroom or class events (Lotkina, 2016). Such measures help to get ……

References

References

Centers for Disease Control and Prevention. (2012). Parent Engagement – Strategies for Involving Parents in School Health. Retrieved from US Department of Health and Human Services website:  https://www.cdc.gov/healthyyouth/protective/pdf/parent_engagement_strategies.pdf 

Lotkina, V. (2016, August 7). 5 Ways to Get Parents Involved in Student Learning Beyond Homework. Retrieved April 15, 2020, from  https://www.gettingsmart.com/2016/08/5-ways-teachers-can-get-parents-involved-beyond-homework/ 

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… tens of millions of consumers being adversely affected (Karn, 2019). For instance, Karn (2019) notes that, “Today, with massive digitization of medical information, mobile data usage and massive system integration, everyday human errors can cause breaches that expose millions of people to potential harm” (para. 5). Of ……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

...Mobile phone Introduction
The USS Cole Bombing in October 2000 was a prelude to the intense focus on the spread of weapons of mass destruction (WMDs) that the FBI took up in earnest one year later in the wake of and in response to 9/11. With the killing of several crewmen and the wounding of several more, the USS Cole Bombing was in reality just one more terrorist incident in an already growing line of attacks (both foreign and domestic) that revealed a pressing need for a counterproliferation strategy. When the USS Cole was hit in Aden harbor, the FBI began focusing on suspects who would later be tied to 9/11 and the spread of terror cells throughout the Middle East.[footnoteRef:2] It was not, of course, the only incident to spark that focus—but it was an important factor in the development of a new counterproliferation strategy that would inevitably become the plan……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Race And Incarceration Rates

Pages: 5 (1649 words) Sources: 8 Document Type:Research Paper Document #:97402010

...Mobile phone Introduction
Race has always been a cultural factor in the U.S. and it is certainly a factor in today’s criminal justice system. James (2018:30) has shown that current “research on police officers has found that they tend to associate African Americans with threat” (30). A significantly higher percentage of the African American population is incarcerated than any other population in the U.S. And, worse, as Lopez (2018) points out, “Black people accounted for 31 percent of police killing victims in 2012, even though they made up just 13 percent of the US population.” The evidence indicates that African Americans receive a disproportionate amount of attention from police and are disproportionately punished and incarcerated because of institutionalized racism within the American ruling class. This racist worldview was evident from the early days of the nation, when the concept of Manifest Destiny was put forward by John O’Sullivan (1845). That concept expressed……

References

References

Aguirre, A., & Baker, D. V. (Eds.). 2008. Structured inequality in the United States: Critical discussions on the continuing significance of race, ethnicity, and gender. New York: Pearson Prentice Hall.

Alexander, Michelle. 2012. The New Jim Crow. New York: New Press.

Davis, Angela. 2012. The Meaning of Freedom. San Francisco: City Light Books.

James, Lois. 2018. The stability of implicit racial bias in police officers. Police Quarterly 21(1):0-52.

Lopez, German. 2018. There are huge racial disparities in how US police use force. Retrieved July 30, 2019 ( https://www.vox.com/identities/2016/8/13/17938186/police-shootings-killings-racism-racial-disparities ).

O’Sullivan, John. 1845. Annexation. United States Magazine and Democratic Review 17(1):5-10.

Pettit, Becky, and Bruce Western. 2004. Mass imprisonment and the life course: Race and class inequality in US incarceration." American sociological review 69(2):151-169.

Plessy v. Ferguson. 1896. Retrieved July 30, 2019 ( https://www.oyez.org/cases/1850-1900/163us537 ).

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".